Call into 614-LULZSEC and pick a target and we'll obliterate it.
Nobody wants to mess with The Lulz Cannon - take aim for us, twitter. #FIRE

In addition to attacks on League of Legends, EVE Online,
and Minecraft, the group attacked gaming magazine The
Escapist, and government-software contractor Finfisher, as we summarize here.

But the group also let slip that it's waiting on 8 phone requests for
additional targets. It's unclear whether the group will hit those targets
today, or take a break from firing its DDoS "cannon".

LulzSec implied in one tweet that it's infecting 4Chan users
and using their machines in a distributed denial of service (DDoS) botnet.
The group writes:

The best part about making 50% of all /b/tards our bots is that
they leave their daddy's laptops on 24/7, more bandwidth for us. :3

The fact that the group is taking phone calls at a time when they've attacked
the U.S. government from several angles is rather bold -- some would say
foolish. Clearly the art of phone obfuscation is not dead, given that no
arrests have been made yet, despite the group's active call line, which is
surely being observed by the U.S.
Federal Bureau of Investigation and others.

DDoS hacks aren't "official" hacks according to the band of bandits.
They state:

We didn't hack any games, we just DDoS'd them with our
not-to-be-messed-with Lulz Cannon. :D We did hack these though: lulzsecurity.com/releases

We'll keep you updated on who gets hacked/DDoSed next "for the lulz".

Update: Wed. June 15, 2011 12:50 p.m. --

It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft). The group mocks that Defense of the Ancients ("DotA") custom scenario for Warcraft III: Reign of Chaos "is better."

The group also posted to Twitter that it's preparing for another EVE Online attack.

Comments

Threshold

Username

Password

remember me

This article is over a month old, voting and posting comments is disabled

So this all goes back to what would be the point? You took down an intranet for a little while? They could just turn off the route from the outside and they still have internal company Intranet and they could just VPN to hit it. I guess I'm confused why you are targeting Dell most of all, considering they haven't done anything.

Maybe to you they didn't. But even the tin man sometimes has to take a fall.

I would love to see Dell in the attacks, first for personal reasons, and second because that network is shit easy to take down and the whole IT infrastructure is a castle of cards.

Sony and others that suffered silly attacks, only fell for it, because they cheapened too much what was supposed to be safe. Dell has a massive centralized DB (Support/Sales/Logistics and much much more) with weak IT infrastructure and little protection or redundancy. Sitting Duck,

You are either a complete fool or the greatest troll I have seen in a while. If you are the latter, hats off to you sir.

Hacking actual network equipment or taking down actual networks is VERY tough beyond just DDOSing things. Most of these hacks are just known server vulnerabilities, they aren't amazing, they are just taking advantage of crappy admins.

I hope you aren't in IT, but if you worked in IT you would see a large portion of the people you encounter there, especially your regular old Windows admins, are not that good. On top of that, people are naturally lazy and companies are cheap, so patches and updates don't happen and things aren't secured all that well.